Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Correlation
biblio
Multiple Fault Diagnosis Methods Based on Multilevel Multi-Granularity PCA
Submitted by aekwall on Mon, 05/18/2020 - 10:47am
multilevel multigranularity PCA
traditional PCA fault diagnosis
Resiliency
pubcrawl
production engineering computing
process monitoring
process fault diagnosis
principal component analysis
multivariate statistical analysis
multiple process variables
multiple fault diagnosis methods
multiple fault diagnosis
Correlation
multi-level
multi-granularity
Metrics
linear correlation
Human Factors
fault diagnosis
fault detection
Data processing
Data models
cyber physical systems
Covariance matrices
biblio
Multi-Tenancy-Capable Correlation of Security Events in 5G Networks
Submitted by aekwall on Mon, 05/04/2020 - 11:07am
multitenancy-capable correlation
5G networks
Network Security Architecture
5G mobile networks
correlation workflow
event processing
infrastructure-as-a-service cloud providers
mobile network operators
multi-tenancy management
security management
multitenancy-capable event correlation architecture
multitenancy-capable management architectures
network-slice-centric security event correlation
security management systems
software-as-a-service providers
telecommunication service providers
telecommunication services
Monitoring
network slicing
NFV
security events
telecommunication computing
5G mobile communication
Stakeholders
Correlation
pubcrawl
Resiliency
computer network management
computer architecture
mobile computing
security
telecommunication security
Cloud Computing
biblio
CAPTAR: Causal-Polytree-based Anomaly Reasoning for SCADA Networks
Submitted by aekwall on Mon, 03/16/2020 - 10:29am
belief propagation
SCADA Systems Security
situational awareness
Compositionality
supervisory control and data acquisition system
security state
SCADA networks
anomaly reasoning
anomaly reasoning framework
Intrusion Detection Systems
CAPTAR
causal analysis
causal polytrees
causal-polytree-based anomaly reasoning
EDMAND anomaly detection framework
meta-alerts
protected SCADA network
real-time reasoning requirement
Correlation
Bayes methods
SCADA
SCADA systems
Resiliency
Human behavior
pubcrawl
pattern classification
Databases
security of data
naïve Bayes classifier
smart power grids
power engineering computing
Smart Grid
Noise measurement
cognition
industrial control system
biblio
A Hybrid Alarm Management Strategy in Signature-Based Intrusion Detection Systems
Submitted by grigby1 on Thu, 03/12/2020 - 12:01pm
hybrid alarm management strategy
Vulnerability Analysis
similarity-based correlation
signature-based intrusion detection systems
Signature-based IDS
sensors
Scalability
Resiliency
resilience
Prelude SIEM
Minimization
Measurement
IP networks
intrusion detection system
Intrusion Detection
signature based defense
HP Arsight priority formula
false alarm reduction
false alarm minimization
event normalizer
dynamic network context information
digital signatures
Databases
cybersecurity defense strategy
Correlation
Alarm systems
alarm prioritization
alarm correlation techniques
pubcrawl
biblio
DifFuzz: Differential Fuzzing for Side-Channel Analysis
Submitted by aekwall on Mon, 03/09/2020 - 11:13am
dynamic analysis
predictability
Security Heuristics
unknown side-channel vulnerabilities
secret-dependent paths
secret program data
resource-guided heuristics
resource usage
resource consumption
Performance analysis
Java programs
fuzzing-based approach
DifFuzz
differential fuzzing
side-channel attacks
side-channel analysis
security of data
fuzzing
side-channel
Time factors
Instruments
execution time
program diagnostics
Java
Correlation
tools
vulnerability detection
pubcrawl
Resiliency
Cryptography
Scalability
biblio
Methods and Special Processors of Entropy Signal Processing
Submitted by grigby1 on Wed, 03/04/2020 - 4:14pm
entropy-manipulated signals
Time
theoretical cryptography
theoretical comments
special processors
signal processing
pubcrawl
Program processors
probability
Probabilistic logic
probabilistic entropy
Hardware
estimation
a special processor
entropy signal processing
Entropy
Cryptography
correlation activity
Correlation
Compositionality
composability
Ciphers
cipher signals
cipher signal receivers
and structural complexity
biblio
Communication Design for Underwater Acoustic Positioning Networks
Submitted by aekwall on Mon, 03/02/2020 - 12:36pm
multiple users UAPN
Underwater Networks
Underwater acoustics
underwater acoustic positioning networks
spread spectrum communication
sonar equation
Sonar
signal design
reliable communication
positioning service
offshore exploration
Oceans
ocean monitoring
networking protocols
narrow acoustic bandwidth
Scalability
marine research
marine engineering
communication design
underwater acoustic communication
telecommunication network reliability
Gold
sensors
Correlation
Metrics
component
Protocols
pubcrawl
Resiliency
Receivers
biblio
Fast and Efficient Web Caching Methods Regarding the Size and Performance Measures per Data Object
Submitted by grigby1 on Tue, 02/18/2020 - 11:54am
Scalability
optimization
optimum knapsack solutions
performance measures per data object
QoS measures
quality of service
rank exchange caching (REC)
rank exchange caching methods
resilience
Resiliency
object hit ratio
score-gated polling (SGP)
simulative evaluation
TE
Throughput
time 25.0 year
time 50.0 year
traffic engineering
Web Caching
web caching strategies
efficient Web caching methods
5G mobile communication
byte hit ratio
cache content
cache storage
Correlation
CPU caches
data chunk storage
Database systems
delays
pubcrawl
generalized value hit ratio
Greedy-Dual
hit ratio optimization and bounds
independent request model
internet
LFU
LRU
metadata
Metrics
biblio
Detecting Android Security Vulnerabilities Using Machine Learning and System Calls Analysis
Submitted by aekwall on Mon, 02/17/2020 - 2:42pm
android
vulnerabilities detection approach
system call
security vulnerabilities detection
security bugs
malicious Android application
detection process
detection algorithm
cyber attackers
Android security vulnerabilities
Android operating systems
system calls
anomaly detection techniques
Compositionality
Android (operating system)
security
vulnerability detection
Measurement
security vulnerabilities
Computer bugs
Anomaly Detection
Correlation
Metrics
machine learning
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
invasive software
Software
biblio
Synthesis of Discrete Complex Nonlinear Signals with Necessary Properties of Correlation Functions
Submitted by aekwall on Mon, 02/17/2020 - 2:23pm
multiuser detection
correlation functions
cryptographic signal
discrete complex nonlinear signals
discrete sequence
distributed spectrum technology
finite field
ICS applications
interference (signal)
isomorphism
correlation function
multiuser systems
nonlinear discrete cryptographic signals
nonlinear discrete sequences
pseudorandom sequences
radio spectrum management
Random sequences
signal detecting
telecommunication systems
signal processing security
Resiliency
pubcrawl
composability
Cryptography
Metrics
Correlation
privacy
channel coding
integrated circuits
telecommunication security
correlation methods
information security
wireless channels
information and communication systems
Broadband communication
radiofrequency interference
autocorrelation properties
channels code division
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
…
next ›
last »